1.
Which of the following is the reason fiber optic cable is MORE secure than CAT5 cable?
2.
NIDS can be used to help secure a network from threats MOST effectively by watching network traffic in order to:
3.
A new administrative assistant starts with the company and tries to access the personnel file for the Vice President of Operations, but is denied. Which of the following BEST describes this access control method?
4.
Which of the following is considered the MOST secure replacement for telnet?
5.
A technician completes a WLAN audit and notices that a number of unknown devices are connected. Which of the following can BEST be completed to mitigate the issue?
6.
A NIPS is primarily used for which of the following purposes?
7.
A disaster recovery exercise should include which of the following action types?
8.
Which of the following should a web application programmer implement to avoid SQL injection attacks?
9.
Which of the following would an auditor use to determine if an application is sending credentials in clear text?
10.
After a recent viral intrusion, an administrator wishes to verify the servers functionality post-clean-up. The administrator should: